Abstract
This chapter explores how the internet materializes in one of the most influential writings on cyberwar and international law, the Tallinn Manual on the International Law Applicable to Cyber Warfare. Based on the work of Molly Sauter, this chapter examines the metaphor used in the Manual to describe the internet, what effect this particular metaphor has, and at which points specific situations made possible by ‘cyberspace’ escape the confines of this particular metaphor.
Assistant Professor of Public International Law, Faculty of Law, Vrije Universiteit Amsterdam; Research Fellow, Centre for the Politics of Transnational Law; l.j.m.boer@vu.nl.
Notes
- 1.
B Mason (2015) Beautiful, Intriguing, and Illegal Ways to Map the Internet, Wired, https://www.wired.com/2015/06/mapping-the-internet/, map no. 13, accessed 24 October 2016; on these attempts at ‘mapping’ see also Cohen 2007, at 237–239.
- 2.
B Mason (2015) Beautiful, Intriguing, and Illegal Ways to Map the Internet, Wired, https://www.wired.com/2015/06/mapping-the-internet/, accessed 24 October 2016; for a critique of the view that the ‘non-material’ elements of the internet are legally relevant, see Zeno-Zencovich 2016, at 9, and the discussion outlined below.
- 3.
- 4.
Agnew 1994, at 55.
- 5.
Schmitt 2013; for the verb ‘materializing’ with regard to the internet, see Graham 2013, at 181. It should be noted that this chapter was finalized prior to the appearance of the ‘sequel’ to the Tallinn Manual (Schmitt 2017); this new edition may contain changes to the sections discussed in this chapter. This chapter, however, is based on the first Tallinn Manual.
- 6.
Schmitt 2013, at 19 (paraphrased).
- 7.
Sauter 2015, at 73.
- 8.
Ibid., at 73.
- 9.
Johnson and Post 1995, at 1381.
- 10.
- 11.
Lambach 2016, at 11.
- 12.
On the artificiality of this distinction, because of the inevitability of the use of metaphors in space-making, see Cohen 2007, at 229; see also 234–235; but see Franzese 2009, at 9, on the distinction between ‘internet’ and ‘cyberspace’ (maintaining a different view from the one held here). For a similar argument about the ‘embedded[ness] into our daily lives’ of the cyberspace metaphor, see Graham 2013, at 180.
- 13.
- 14.
- 15.
- 16.
Cohen 2007, at 212 and 213–214, 237–239, who similarly refers to these camps as ‘exceptionalists’ and ‘unexceptionalists’, with regard to their notion of cyberspace as distinct (or not) from ‘real space’. See also Hollis 2015, at 136. Hollis similarly refers to Cohen here; the latter points out that both ideas of ‘sameness’ as well as ‘difference’ rest upon ‘[the] metaphoric construct of cyberspace as separate space’ (at 215). In her piece, she reflects on critiques of the metaphor of cyberspace and rejects the question as to the ‘real nature’ of cyberspace – instead, she says, we have to enquire into ‘what kind of space a world that includes cyberspace is and will become’ (at 213). Benoliel similarly argues against the distinction between the unexceptionalists and the exceptionalists; see Benoliel 2005, at 150; Ryngaert 2014, at 18; see also Lambach 2016, at section 3.2. Herrera argues the ‘gap’ between ‘cyberspace’ and the state’s territoriality is not as wide as commonly assumed. See Herrera 2005, e.g. at 2–3. Underlying his argument in part is his claim that the idea of technology having a fixed ‘nature’ is ‘at odds’ with the fact that technology is man-made; he states that ‘technology is political’ (Herrera 2005, at 9); see also Tsagourias 2015, at 14 and Cohen 2007, at 217, pointing out the ‘essentialist’ label applied to this view of the internet. On theories based on ‘the technological malleability of cyberspace’ see ibid., at 221 et seq. and 250 et seq. on STS. For the tripartite division in ‘law space’, ‘real space’ and cyberspace, see Benoliel 2005, at 146 et seq.; for the word ‘law space’ Benoliel refers to Johnson and Post 1995, at 1368.
- 17.
Herrera 2005, at 3 and 4–5.
- 18.
Johnson and Post 1995, i.a. at 1370 et seq.
- 19.
- 20.
- 21.
- 22.
Graham 2013, at 179.
- 23.
Post 2007, at 891–893. In response, see MN Schmitt (2015) PILAC Lecture on Cyber Operations and IHL: Fault Lines and Vectors, 3 April 2015, https://www.youtube.com/watch?v=ZWwrVAMSOT4, accessed 11 May 2016, at 7.00. See, for a critique of exceptionalism, Cohen 2007, at 215–219.
- 24.
Stein 1998, at 1175.
- 25.
Ibid., at 1180.
- 26.
Ibid., at 1181 (emphasis added).
- 27.
For a critique of unexceptionalism, see Cohen 2007, at 219–221.
- 28.
- 29.
MN Schmitt (2015) PILAC Lecture on Cyber Operations and IHL: Fault Lines and Vectors, 3 April 2015, https://www.youtube.com/watch?v=ZWwrVAMSOT4, accessed 11 May 2016, at 7.00; MN Schmitt (2012) ILD 2012 Panel Discussion: Cyber Conflict and the Law of Armed Conflict, 25–27 June 2012, https://www.youtube.com/watch?v=sglT605YIu4, accessed 13 May 2016, at 5.32.
- 30.
See Schmitt 2013, at 239 et seq; I will briefly return to ‘occupation in cyberspace’, below.
- 31.
Ibid., at 113.
- 32.
See also Werner and Boer 2017. In so doing, the Tallinn Manual places itself squarely in a tradition of international legal handbooks on the application of the laws of war to a new phenomenon—such as armed conflict at sea and air and missile warfare, aimed at ‘examin[ing] how extant legal norms applied to [a specific kind] of warfare.’ See Schmitt 2013, at 1; on this positioning, see Boer 2017, Chapter 5.
- 33.
- 34.
Schmitt 2013, at 18.
- 35.
- 36.
- 37.
- 38.
- 39.
Schmitt 2013, at 16.
- 40.
Ibid., at 17; see also Finnemore and Hollis 2016, 460.
- 41.
Schmitt 2013, at 17.
- 42.
Ibid., at 19 (emphases added).
- 43.
- 44.
A similar phraseology is used by Lambach 2016, at 4; see also the references in footnotes 3 and 4.
- 45.
As stated, this threefold distinction is based on Benoliel 2005, at 146–151.
- 46.
- 47.
- 48.
Lakoff and Johnson 1980.
- 49.
Sauter 2015; see also Olson 2005, who also refers to the ‘cyberspace as place metaphor’ (at 10). For her discussion of other metaphors, see at 14–17; for further references to works on cyberspace and metaphors, see Lambach 2016, at 9–10. On the impact of metaphors on policy choices, see footnote 52, below, and the conclusion of this chapter.
- 50.
- 51.
Ibid., at 64–66; for the inevitability of this move, see also Cohen 2007, at 229.
- 52.
- 53.
- 54.
Sauter 2015, at 72 et seq.
- 55.
Ibid., at 73 (emphasis in original).
- 56.
Ibid., at 73.
- 57.
Schmitt 2013, at 19; for Sauter’s argument about the relation between data and the ‘internet has a real-world geography’, see Sauter 2015, at 73. She discusses the ‘data as an object’ metaphor separately, but also suggests this metaphor and the one described in this section support each other. See ibid., at 72.
- 58.
- 59.
- 60.
- 61.
Sauter 2015, at 73.
- 62.
Ibid., at 72; similarly, Cohen 2007, at 211 and 217–218 (reflecting on the physical presence of cyberspace users). Thanks to Sofia Stolk for a discussion on this point.
- 63.
B Mason (2015) Beautiful, Intriguing, and Illegal Ways to Map the Internet, Wired, https://www.wired.com/2015/06/mapping-the-internet/, accessed 24 October 2016.
- 64.
See also Lambach 2016, at 4.
- 65.
Benoliel 2005, at 146–148; see also footnote 16, above.
- 66.
Ibid., at 146.
- 67.
Ibid., at 155.
- 68.
Ibid., at 147.
- 69.
Manjikian 2015, at 65.
- 70.
Schmitt 2013, at 19.
- 71.
Ibid., at 19.
- 72.
Note that the possibility of spoofing is one of the reasons Johnson and Post argue against the idea of an analogy between physical (territorial) space and the internet. See Johnson and Post 1995, at 1374.
- 73.
Schmitt 2013, at 239.
- 74.
Ibid., at 239.
- 75.
Ibid., at 239.
- 76.
- 77.
- 78.
- 79.
MN Schmitt (2012) CyCon 2012 Tallinn Manual Part I, 4th Annual International Conference on Cyber Conflict (CyCon), 5–8 June 2012, Tallinn, https://www.youtube.com/watch?v=wY3uEo-Itso, accessed 26 April 2016, at 8.08.
- 80.
- 81.
Lambach 2016, at 2 (emphasis omitted).
- 82.
Sauter 2015, at 73.
- 83.
- 84.
It should be noted that any link between a formal doctrine on cyberwar as adhered to by NATO , and the work of the Tallinn Manual experts has been vehemently denied time and again by the experts and their director themselves. See, for example, Schmitt 2013, at 11; and MN Schmitt (2012) CyCon 2012 Tallinn Manual Part I, 4th Annual International Conference on Cyber Conflict (CyCon), Tallinn, 5–8 June 2012, https://www.youtube.com/watch?v=wY3uEo-Itso, accessed 26 April 2016, at 1.48.
- 85.
On ‘[(un)]consciously chosen’ metaphors, see Cohen 2007, at 229.
- 86.
Lambach 2016, at 12.
- 87.
MN Schmitt (2015) PILAC Lecture on Cyber Operations and IHL: Fault Lines and Vectors, 3 April 2015, https://www.youtube.com/watch?v=ZWwrVAMSOT4, accessed 11 May 2016, at 52.31.
- 88.
Schmitt 2013, at 6, 7; MN Schmitt (2012) CyCon 2012 Tallinn Manual Part I, 4th Annual International Conference on Cyber Conflict (CyCon), Tallinn, 5–8 June 2012, https://www.youtube.com/watch?v=wY3uEo-Itso, accessed 26 April 2016, at 11.17; MN Schmitt (2015) PILAC Lecture on Cyber Operations and IHL: Fault Lines and Vectors, 3 April 2015, https://www.youtube.com/watch?v=ZWwrVAMSOT4, accessed 11 May 2016, at 52.59.
- 89.
Sauter suggests this might happen, see Sauter 2015, at 70.
- 90.
For a similar point, see Ryngaert 2014, at 1.
References
Agnew J (1994) The Territorial Trap: The Geographical Assumptions of International Relations Theory. Review of International Political Economy 1:53–80
Benoliel D (2005) Law, Geography and Cyberspace: The Case of On-Line Territorial Privacy. Cardozo Arts & Entertainment Law Journal 23(1):125–196
Boer LJM (2013) Restating the Law ‘As It Is’: On the Tallinn Manual and the Use of Force in Cyberspace. Amsterdam Law Forum 5(3):4–18
Boer LJM (2017) International law as we know it: Cyberwar discourse and the construction of knowledge in international legal scholarship. Dissertation Vrije Universiteit Amsterdam
Brunnée J, Tamar M (2015) Teaching an Old Law New Tricks: International Environmental Law Lessons for Cyberspace Governance. In: Odendahl K, Matz-Lück N, von Arnauld A (eds) German Yearbook of International Law, Vol 58. Duncker & Humblot, Berlin, pp 129–168
Byassee WS (1995) Jurisdiction of Cyberspace: Applying Real World Precedent to the Virtual Community. Wake Forest Law Review 30:197–220
Cohen JE (2007) Cyberspace as/and Space. Columbia Law Review 107:210–256
Finnemore M, Hollis D (2016) Constructing Norms for Global Cybersecurity. American Journal of International Law 110: 425–479
Franzese PW (2009) Sovereignty in Cyberspace: Can it Exist? Air Force Law Review 64:-1–42
Graham M (2013) Commentary Geography/internet: Ethereal alternate dimensions of cyberspace or grounded augmented realities? The Geographical Journal 179: 177–182
Herrera GL (2005) Cyberspace and Sovereignty: Thoughts on Physical Space and Digital Space. First International CISS/ETH Conference on The Information Revolution and the Changing Face of International Relations and Security, Lucerne, Switzerland
Hollis D (2015) Re-Thinking the Boundaries of Law in Cyberspace: A Duty to Hack? In: Ohlin JD, Govern K, Finkelstein C (eds) Cyber War: Law and Ethics for Virtual Conflicts. Oxford University Press, Oxford, pp 129–174
Johnson DR, Post D (1995) Law and Borders: The Rise of Law in Cyberspace. Stanford Law Review 48:1367–1402
Lakoff G, Johnson M (1980) Metaphors we Live By. The University of Chicago Press, Chicago/London
Lambach D (2016) The Territorialization of Cyberspace. Conference Paper. https://www.researchgate.net/publication/308720083_The_Territorialization_of_Cyberspace. Accessed 16 February 2017
Manjikian M (2015) Confidence-building in Cyberspace: A Comparison of Territorial and Weapons-based Regimes. Strategic Studies Institute and United States Army War College Press, Carlisle Barracks
McEvoy Manjikian M (2010) From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik. International Studies Quarterly 54: 381–401
Olson KK (2005) Cyberspace as Place and the Limits of Metaphor Convergence: The International Journal of Research into New Media Technologies 11(1):10–18
Pirker B (2013) Territorial Sovereignty and Integrity and the Challenges of Cyberspace. In: Ziolkowski K (ed) Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy. NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) Publications, Tallinn, pp 189–216
Post DG (2007) Governing Cyberspace: Law Symposium Review. Santa Clara High Technology Law Journal 24:883–913
Roscini M (2014) Cyber Operations and the Use of Force in International Law. Oxford University Press, Oxford
Ryngaert CMJ (2014) The End of Territory? The Re-Emergence of Community as a Principle of Jurisdictional Order in the Internet Era. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2523354. Accessed 6 December 2016
Sauter M (2015) Show Me On the Map Where They Hacked You: Cyberwar and the Geospatial Internet Doctrine. Case Western Reserve Journal of International Law 47:63–77
Schmitt MN (2012) ILD 2012 Panel Discussion: Cyber Conflict and the Law of Armed Conflict, 25–27 June 2012, https://www.youtube.com/watch?v=sglT605YIu4, accessed 13 May 2016
Schmitt MN (2012) CyCon 2012 Tallinn Manual Part I, 4th Annual International Conference on Cyber Conflict (CyCon), 5–8 June 2012, Tallinn, https://www.youtube.com/watch?v=wY3uEo-Itso, accessed 26 April 2016
Schmitt MN (ed) (2013) Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge
Schmitt MN (2015) PILAC Lecture on Cyber Operations and IHL: Fault Lines and Vectors, 3 April 2015, https://www.youtube.com/watch?v=ZWwrVAMSOT4, accessed 11 May 2016
Schmitt MN (ed) (2017) Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, Cambridge
Stein AR (1998) The Unexceptional Problem of Jurisdiction in Cyberspace. The International Lawyer 32:1167–1194
Steinberg P, McDowell S (2003) Global Communication and the Post-Statism of Cyberspace: A Spatial Constructivist View. Review of International Political Economy 10:196–221
Tsagourias N (2015) The Legal Status of Cyberspace. In: Tsagourias N, Russel B (eds) Research Handbook on International Law and Cyberspace. Edward Elgar Publishing, Cheltenham/Northampton, pp 13–29
Werner WG (2017) The Law at Hand: What Does it Mean to Restate International Humanitarian Law in the Form of a Manual? In: Krieger H (ed) Legitimacy in International Humanitarian Law. Forthcoming
Werner WG, Boer LJM (2017) It Could Probably Just as Well Be Otherwise: Imageries of Cyberwar. In: Ambrus M, Rayfuse R, Werner W (eds) Risk and the Regulation of Uncertainty in International Law. Oxford University Press, Oxford, pp 39–55
Zeno-Zencovich V (2016) Around the CJEU Schrems Decision: Digital Sovereignty and International Governance of Telecommunication Networks. https://papers.ssrn.com/sol3/papers2.cfm?abstract_id=2788789. Accessed 27 November 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 T.M.C. Asser Press and the authors
About this chapter
Cite this chapter
Boer, L.J. (2017). ‘Spoofed Presence Does not Suffice’: On Territoriality in the Tallinn Manual. In: Kuijer, M., Werner, W. (eds) Netherlands Yearbook of International Law 2016. Netherlands Yearbook of International Law, vol 47. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-207-1_6
Download citation
DOI: https://doi.org/10.1007/978-94-6265-207-1_6
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-206-4
Online ISBN: 978-94-6265-207-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)